feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Charité  (76)
  • Medienzentrum Ostprignitz-Ruppin  (5)
  • FH Potsdam  (4)
  • Moses Mendelssohn Zentrum  (1)
  • SB Finsterwalde
  • SB Erkner
  • 2010-2014  (86)
Medientyp
Sprache
Region
Bibliothek
Virtuelle Kataloge
Erscheinungszeitraum
Jahr
  • 1
    UID:
    almafu_BV041407220
    Umfang: 297 Seiten.
    Ausgabe: 2. Auflage
    ISBN: 3-86881-506-6 , 978-3-86881-506-1
    Anmerkung: Literaturverzeichnis Seite 273 - 283
    Weitere Ausg.: Erscheint auch als Online-Ausgabe ISBN 978-3-86414-460-8
    Weitere Ausg.: Erscheint auch als Online-Ausgabe, PDF ISBN 978-3-86414-459-2
    Sprache: Deutsch
    Fachgebiete: Informatik , Wirtschaftswissenschaften , Allgemeines , Soziologie
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Informationsgesellschaft ; Sozialer Wandel ; Big Data ; Datenanalyse ; Datenmanagement ; Informationsbeschaffung ; Privatsphäre ; Datenschutz ; Privatsphäre ; Datenschutz ; Big Data
    Mehr zum Autor: Cukier, Kenneth
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Buch
    Buch
    Berlin :Jovis-Verl.,
    UID:
    almafu_BV041719032
    Umfang: 559 S. : , Ill., graph. Darst., Kt.
    ISBN: 978-3-86859-317-4
    Sprache: Englisch
    Fachgebiete: Technik , Ethnologie , Soziologie
    RVK:
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Verstädterung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung
    Mehr zum Autor: Brenner, Neil 1969-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    almafu_(DE-604)BV039652755
    Umfang: XXVIII, 1452 S. : , Ill., graph. Darst. ; , 29 cm.
    Ausgabe: 5. Aufl.
    ISBN: 978-3-527-32754-6
    Originaltitel: Organic chemistry
    Sprache: Deutsch
    Fachgebiete: Chemie/Pharmazie
    RVK:
    RVK:
    Schlagwort(e): Organische Chemie ; Lehrbuch ; Lehrbuch ; Lehrbuch ; Lehrbuch ; Lehrbuch ; Lehrbuch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    almafu_BV041555605
    Umfang: 1 DVD-Video (117 min + 29 min Bonus) : , farbig ; , 12 cm.
    Inhalt: "Ein angesehener Anwalt aus Albany wird mit seiner Vergangenheit als linksradikaler "Weatherman" konfrontiert, als Mitglied jener Gruppe radikaler Vietnam-Kriegsgegner, die in den frühen 1970er-Jahren in verschiedenen Städten der USA Attentate verübten. Als eine Weggefährtin sich dem FBI stellt und ein ehrgeiziger Journalist die Hintergründe aufdeckt, will er seinen Namen reinwaschen und muss seine ehemalige Geliebte ausfindig machen, die ihn entlasten könnte. Ein packendes, durch genaue Dialoge und markante Charaktere vorangetriebenes Politdrama, das sich einem wenig bekannten Kapitel der US-Geschichte widmet und dessen Folgen für die Gegenwart beschreibt. Die Handlung wird aus drei Perspektiven erzählt, deren Erzählfäden in einer einsamen Hütte in Michigan zusammenlaufen." [filmdienst.de]
    Anmerkung: Original: USA, Kanada 2012. - Bildformat 2.40:1 (16:9). - Special Features: hinter den Kulissen, deutscher und Original-Kinotrailer , Deutsch, englisch - Untertitel: deutsch
    Sprache: Deutsch
    Schlagwort(e): Mord ; Alleinerziehender Vater ; Thriller ; Film ; DVD-Video ; Film ; DVD-Video
    Mehr zum Autor: Redford, Robert 1936-
    Mehr zum Autor: Christie, Julie 1941-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Oxford :Academic,
    UID:
    almahu_9947366640802882
    Umfang: 1 online resource (3987 p.)
    Ausgabe: 3rd ed.
    ISBN: 1-283-73425-7 , 0-12-382220-3
    Inhalt: The third edition of the Handbook of Proteolytic Enzymes is a comprehensive reference work for the enzymes that cleave proteins and peptides, written by acknowledged experts in the field and containing over 850 chapters. Each chapter is organized into sections describing the name and history, activity and specificity, structural chemistry, preparation, biological aspects, and distinguishing features for a specific peptidase. There are also introductory chapters on peptidase classification and mechanisms and a comprehensive index. For the first time, the Handbook is also
    Anmerkung: Previous ed.: London: Elsevier Academic, 2004. , Front Cover; Handbook of Proteolytic Enzymes; Copyright Page; Contents; Editor Biographies; Contributors; Preface; Introduction; Terminology; Organization of the Handbook; Special forms of information in the Handbook; Links to the MEROPS database; Molecular images; Alignments; Secondary structure; Description of substrate specificity; References; Aspartic Peptidases; 1 Introduction: Aspartic and Glutamic Peptidases and Their Clans; Clan AA; Family A1; Other Families in Clan AA; Clan AF; Clan AC; Clan AD; Clan AE; Other Families; Glutamic Peptidases; Asparagine Peptide Lyases , Clans NA, NC and NEInteins; Autotransporters; References; 2 Catalytic Pathways of Aspartic Peptidases; Introduction; Enzymatic Mechanism of Aspartic Peptidases; Enzymatic Mechanism of Glutamic Peptidases; References; 3 Pepsin A; Databanks; Name and History; Activity and Specificity; Structural Chemistry; Pepsinogen; Preparation; Biological Aspects; Related Peptidases; Further Reading; References; 4 Pepsin B; Databanks; Name and History; Activity and Specificity; Structural Chemistry; Preparation; Biological Aspects; Further Reading; References; 5 Chymosin; Databanks; Name and History , Activity and SpecificityStructural Chemistry; Preparation; Biological Aspects; Distinguishing Features; Related Proteinases; Further Reading; References; 6 Cathepsin E; Databanks; Name and History; Activity and Specificity; Structural Chemistry; Preparation; Biological Aspects; Tissue Distribution and Subcellular Localization; Regulation of Gene Expression; Processing, Maturation and Intracellular Trafficking Of Cathepsin E; Physiological Roles of Cathepsin E; Distinguishing Features; Further Reading; References; 7 Gastricsin; Databanks; Name and History; Activity and Specificity , Structural ChemistryProgastricsin; Preparation; Biological Aspects; References; 8 Cathepsin D; Databanks; Name and History; Activity and Specificity; Assay Methods; Specificity; Inhibition and Activation; Structural Chemistry; Three-dimensional Structure; Preparation; Biological Aspects; Gene and Expression Control; Knock-out Model; Organ Distribution and Cellular Localization; Apoptosis; Involvement in Cancer; Neurodegeneration; Other Biological Functions; Distinguishing Features; Related Peptidases; Acknowledgment; Further Reading; References; 9 Nothepsin; Databanks; Name and History , Activity and SpecificityStructural Chemistry; Primary Structure Analysis; Distinguishing Features of This New Class of Aspartic Proteinases; Retrieval and Sequencing of Nothepsin Enzymes; Presence of a Nothepsin Enzyme in Non-Antarctic Fish; Nothepsin in Organisms Other Than Fish; Preparation; Biological Aspects; Expression Pattern of the Nothepsin in Fish and Lizard; Phylogenetic Analysis, Adaptive Evolution and Role of Nothepsin; Further Reading; References; 10 Napsin A; Databanks; Name and History; Activity and Specificity; Structural Chemistry; Preparation; Biological Aspects , Further Reading , English
    Weitere Ausg.: ISBN 0-12-382219-X
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    UID:
    almahu_9948324389502882
    Umfang: xvi, 232 p. : , ill.
    Ausgabe: Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
    Sprache: Englisch
    Schlagwort(e): Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    UID:
    almahu_9949577312102882
    Umfang: 1 online resource (135 p.)
    Ausgabe: 1st ed.
    ISBN: 1-280-12694-9 , 9786613530806 , 0-8330-5960-2
    Serie: Technical report ; [TR-933-EC]
    Inhalt: This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe.
    Anmerkung: "Sponsored by the European Commission Directorate General Information Society and Media". , Cover; Title Page; Copyright; Preface; Acknowledgements; Contents; Glossary; Executive Summary; Synthesis; Defining cloud computing; Defining security, privacy and trust; Issues arising from the reviewed literature; Risk control frameworks; Operational challenges; Implications from case studies; Gap analysis; Solving the challenges: observations and recommendations; Conclusions; Methodology; Structure of the report; Chapter 1:Introduction; Chapter 2: Definitions and drivers; 2.1 Definitions of cloud computing; 2.2 What's pushing cloud take-up? , 2.3 The economics of cloud computing: implications for security; 2.4 Concluding remarks; Chapter 3: Understanding the implications for security, privacy and trust; 3.1 Defining security, privacy and trust; 3.2 Growing focus on security, privacy and trust concerns; 3.3 Identifying key issues and possible enablers for security, trust and privacy in the cloud; Chapter 4: Security, privacy and trust challenges stemming from the technological underpinnings of cloud computing; 4.1 The linchpin of trust: the hypervisor , 4.2 Can the distributed models of computation characteristic of grid technology adequately serve the availability and interoperability needs of cloud computing?; 4.3 Current state-of-the-art web services may not be sufficient to establish interoperability for identity management in the cloud; 4.4 Trustworthiness in service-orientated architectures (SOAs); 4.5 Will web application frameworks (APIs and SDKs) be credible in providing trust across distributed environments?; 4.6 The fragility of current encryption approaches in the cloud context; 4.7 Concluding remarks , Chapter 5: Security, privacy and trust challenges inherent to the legal and regulatory aspects of cloud computing; 5.1 Horizontal perspective: applicable law and jurisdiction; 5.2 Vertical issues: main applicable laws; 5.3 The will of the parties: contractual provisions; 5.4 Overcoming legal barriers: key tools; 5.5 Concluding remarks; Chapter 6: Putting it all together: key risks and operational challenges; 6.1 Summary of legal and technical issues; 6.2 Migrating to the cloud: the operational challenges; Chapter 7: Case studies; 7.1 Introduction; 7.2 Initial classification of case studies , 7.3 Observations on case studies in practice; 7.4 Matrix of case study typology; 7.5 Case Study 1: the Danish National IT and Telecom Agency; 7.6 Case study 2: the City of Los Angeles; 7.7 Case study 3: EU eHealth provider; 7.8 Implications; Chapter 8: Gap analysis; Chapter 9: Solving the challenges: recommendations and actions; 9.1 Introduction; 9.2 Recommendations; 9.3 Specific actions; Chapter 10: Conclusions; References; Appendices , English
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    Urbana, Illinois :AOCS Press,
    UID:
    almahu_9948026147902882
    Umfang: 1 online resource (540 p.)
    ISBN: 0-12-804344-X , 0-9888565-5-7 , 1-61344-998-4
    Inhalt: This book covers the progress of the last 10 years of studies on cocoa butter. Descriptions of several aspects, including physical characteristics such as rheology, hardness, melt profiles, etc., studied by new and advanced techniques are included. Similarly, the polymorphism of cocoa butter is reconsidered in light of studies done by synchrotron DSC, FTIR, and SAXS techniques. These data are complemented by new understandings on the cause of the crystallization and transitions of the polymorphs. Other aspects such as the effect of minor components, emulsifiers, and other fats are discussed in
    Anmerkung: Description based upon print version of record. , Front Cover; CocoaButter andRelatedCompounds; Copyright Page; Table of Contents; Preface; Chapter 1. Chocolate and Cocoa Butter-Structure and Composition; Introduction; Chocolate Composition and Structure; Cocoa Butter Composition; Structure and Polymorphism of Cocoa Butter; Effect of Cocoa Butter Composition and Structure on Chocolate Composition and Structure; References; Chapter 2. Theobroma cacao-An Introduction to the Plant, Its Composition, Uses, and Health Benefits; Introduction; Cacao and Cocoa-From Tree to Factory; Industrial Processing of Cocoa; Cocoa-Chemical Composition and Health , Cocoa, Chocolate, and Health-Insights from Epidemiological StudiesConclusions; References; Chapter 3. Cocoa Polyphenols; Introduction; Cocoa Polyphenols on Skin Structure Experiment; Conclusions; Acknowledgment; References; Chapter 4. Phase Behavior of Saturated Triacylglycerides-Influence of Symmetry and Chain Length Mismatch; Introduction; Materials and Methods; Melting Behavior and Phase Development of the Symmetrical/Asymmetrical TAG Binary Systems; Phase Diagrams of the Symmetrical/Asymmetrical TAG Binary Systems , Comparison of the Phase Behavior of the Symmetrical/Asymmetrical Binary Systems with CLM = 2, 4, 6, and 8References; Chapter 5. Molecular Composition Dynamics and Structure of Cocoa Butter; Introduction; Materials and Methods; Shear Work; Chemical Makeup and Structure; Conclusions; References; Chapter 6. Polymorphism and Mixing Phase Behavior of Major Triacylglycerols of Cocoa Butter; Introduction; Polymorphism and Mixing Behavior of Fats; Polymorphism of Cocoa Butter and Its Component TAGs; Mixing Behavior of POP, POS, and SOS; Conclusions; References , Chapter 7. Causes and Best Manufacturing Practices to Minimize Bloom in ConfectionsIntroduction; Definition and Characterization; Overview of Key Attributes in Confectionery Fats; Causes; Key Factors Contributing to Bloom from Composition to Oil Migration; Conclusions; References; Chapter 8. Morphology of Chocolate Fat Bloom; Introduction; Classification by Morphology of Chocolate Fat Bloom; Type 1 Bloom; Type 2 Bloom; Type 3 Bloom; Other Types; Summary; Conclusions; References; Chapter 9. Effect of Minor Components on Cocoa Butter Polymorphism and Kinetics of Crystallization; Introduction , Minor ComponentsFree Fatty Acids; FFA Effects on Microstructure; Diglycerides; Phospholipids; Sterol and Sterol Esters; Total Minor Lipids; Conclusions; References; Chapter 10. Noncocoa Ingredients on Cocoa Butter Crystallization; Introduction; Effect of Sugar with or without Emulsifier on Cocoa Butter Crystallization; Lecithin; Milk Powder; Conclusions; References; Chapter 11. Impact of Cocoa Butter Originon Crystal Behavior; Introduction; Characteristics of Cocoa Butterfrom Different Origins; Effect of Environmental Conditions and Agronomic Practices on Cocoa Butter Composition , Crystallization Habit of Cocoa Butter from Different Origins , English
    Weitere Ausg.: ISBN 0-9830791-2-9
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    Waltham, Mass. :Elsevier,
    UID:
    almahu_9947368440602882
    Umfang: 1 online resource (265 p.)
    Ausgabe: 1st edition
    ISBN: 1-283-39413-8 , 9786613394132 , 1-59749-666-9
    Inhalt: Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed desc
    Anmerkung: Includes index. , Front Cover; Low Tech Hacking: Street Smarts for Security Professionals; Copyright; Contents; Acknowledgments; Foreword; About the Authors; Introlduction; Book Overview and Key Learning Points; Book Audience; How this Book is Organized; Chapter 1: Social engineering: The ultimate low tech hacking threat; Chapter 2: Low tech vulnerabilities: Physical security; Chapter 3: More about locks and ways to low tech hack them; Chapter 4: Low tech wireless hacking; Chapter 5: Low tech targeting and surveillance: How much could they find out about you? , Chapter 6: Low tech hacking for the penetration testerChapter 7: Low tech hacking and the law: Where can you go for help?; Chapter 8: Information security awareness training: Your most valuable countermeasure to employee risk; Conclusion; Chapter 1: Social engineering: The ultimate low tech hacking threat; How Easy is it?; The Mind of a Social Engineer; The mind of a victim; Tools of The Social Engineering Trade; One of my favorite tools of the trade; Social engineering would never work against our company; What Was I Able to Social Engineer Out of Mary? , The Final Sting-Two weeks Later-Friday AfternoonWhy did this scam work?; Let's look at a few more social engineering tools; Keystroke logger: Is there one under your desk?; One of my lunchtime tools; Let's look at that Telephone butt-in set on my tool belt; Meet Mr. Phil Drake; Meet Mr. Paul Henry; Traditional AV, IDS, and IPS considerations; Traditional firewall consideration; Flaw remediation; Do you have a guest user of your credit card?; A few possible countermeasures; Always be slightly suspicious; Start to study the art of social engineering; Start a social engineering book library , SummaryChapter 2: Low tech vulnerabilities: Physical security; A mini risk assessment; What did I have at risk?; What were some possible threats while out on the lake?; What were some of the possible vulnerabilities?; And finally, what about my countermeasures?; Outsider-Insider Threats; Some things to consider for the security of your buildings; Check all locks for proper operation; Use employee badges; Shredder technology keeps changing as well; Keep an eye on corporate or agency phone books; Unsecured areas are targets for tailgating; Special training for off-shift staff , Bomb threats in ChicagoCheck those phone closets; Remove a few door signs; Review video security logs; Consider adding motion-sensing lights; Subterranean vulnerabilities; Clean Out Your Elephant Burial Ground; Spot Check Those Drop Ceilings; Internal auditors are your friends; BONUS: Home Security Tips; Summary; Chapter 3: More about locks and ways to low tech hack them; A little more about locks and lock picking; What kinds of locks are the most popular?; Purchasing better quality locks will be cost effective; Be aware of lock vulnerabilities; Forced entry-and other ways to cheat! , A time-tested low tech method of forced entry , English
    Weitere Ausg.: ISBN 1-59749-665-0
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Buch
    Buch
    München [u.a.] :Pearson Studium,
    UID:
    almafu_BV039131176
    Umfang: LIV, 1918 S. : , zahlr. Ill., graph. Darst., Kt. , 1 Beil.
    Ausgabe: 8., aktualisierte Aufl., [4. Nachdr.]
    ISBN: 978-3-8273-7287-1
    Serie: bio : Biologie
    Originaltitel: Biology
    Anmerkung: Auflagenzählung bezieht sich auf die engl. Orig.-Aufl.
    Sprache: Deutsch
    Fachgebiete: Biologie
    RVK:
    Schlagwort(e): Biologie ; Biologieunterricht ; Ökologie ; Gymnasium ; Oberstufe ; Lehrbuch ; Examination Questions ; Lehrbuch
    Mehr zum Autor: Reece, Jane B. 1944-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz